Home   >   CSC-OpenAccess Library   >    Manuscript Information
A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network
Rajender Nath , Pankaj Kumar Sehgal
Pages - 16 - 22     |    Revised - 20-03-2009     |    Published - 15-03-2009
Volume - 3   Issue - 1    |    Publication Date - February 2009  Table of Contents
MORE INFORMATION
KEYWORDS
Ad Hoc Network, Routing Protocol, Simulator
ABSTRACT
Significant progress has been made for making mobile ad hoc networks secure and dynamic. The unique characteristics like infrastructure-free and absence of any centralized authority make these networks more vulnerable to security attacks. Due to the ever-increasing security threats, there is a need to develop algorithms and protocols for a secured ad hoc network infrastructure. This paper presents a secure routing protocol, called EDSR (Encrypted Dynamic Source Routing). EDSR prevents attackers or malicious nodes from tampering with communication process and also prevents a large number of types of Denial-of-Service attacks. In addition, EDSR is efficient, using only efficient symmetric cryptographic primitives. We have developed a new program in c++ for simulation setup.
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 Academic Index 
5 CiteSeerX 
6 refSeek 
7 iSEEK 
8 Socol@r  
9 ResearchGATE 
10 Libsearch 
11 Bielefeld Academic Search Engine (BASE) 
12 Scribd 
13 WorldCat 
14 SlideShare 
15 PDFCAST 
16 PdfSR 
17 Chinese Directory Of Open Access 
18 Free-Books-Online 
11. I. Chakeres et. Al.,“Dynamic MANET On-demand (DYMO)Routing”,draft-ietf-manet-dymo-14, June 25, 2008.
C Kaufman, “DASS: Distributed Authentication Security Service”, RFC 1507, 1993.
C. R. Davis., “IPSec: Securing VPNs”, Osborne/McGraw-Hill, New York, 2001.
C. S. R. Murthy and B. S. Manoj, “Ad Hoc Wireless Networks: A Architectures and Protocols”, Prentice Hall PTR, 2004.
D. Johnson and D. Maltz., “Dynamic source routing in ad-hoc wireless networks routing protocols”, In Mobile Computing, pages 153-181. Kluwer Academic Publishers, 1996.
E. Ayannoglu et al., “ Diversity Coding for Transparent Self-Healing and Fualt-Tolerant Communication Networks”, IEEE Trans. Comm. 41(11), 1993.
I. Chakeres et. Al.,“IANA Allocations for MANET Protocols”,draft-ietf-manet-iana-07, November 18, 2007.
IEEE-SA Standards Board. IEEE Std 802.11b-1999, 1999.
J. Macker et Al., “Simplified Multicast Forwarding for MANET”, draft-ietf-manet-smf-07, February 25, 2008.
J. Tardo and K. Algappan, “SPK: Global Authentication Using Public Key Ceriticates”, Proc. IEEE Symp. Security and Privacy, CA, 1991.
L. Zhou and Z. Haas, “Securing Ad Hoc Networks”, IEEE Networks, 13(6), 1999.
M. Gasser et al., “The Digital Distributed Systems Security Architecture”, Proc. 12th Natl. Comp. Security Conf., NIST, 1989.
N.Bhalaji, A.Shanmugam, Druhin mukherjee, Nabamalika banerjee, “Direct trust estimated on demand protocol for secured routing in mobile Adhoc networks”, in IJCSS: International Journal of Computer Science and Security, "Volume 2, Issue 5, pages 6-12, September/ October 2008.
P. Gutmann. Cryptlib encryption tool kit. http://www.cs.auckland.ac.nz/~pgut001/cryptlib.
P. Papadimitratos and Z. J. Haas, “Secure Routing for Mobile Ad hoc Networks”, In Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan. 2002.
R. Droms, “ Dynamic Host Configuration Protocol”, IETF RFC 2131, 1997.
R.Asokan , A.M.Natarajan, C.Venkatesh, “Ant Based Dynamic Source Routing Protocol to Support Multiple Quality of Service (QoS) Metrics in Mobile Ad Hoc Networks”, in IJCSS: International Journal of Computer Science and Security, "Volume 2, Issue 3, pages 48-56, May/June 2008.
Rashid Hafeez Khokhar, Md Asri Ngadi, Satria Mandala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, in IJCSS: International Journal of Computer Science and Security, "Volume 2, Issue 3, pages 18-29, May/June 2008.
S. Buchegger and J. LeBoudec, “ Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustnes in Mobile Ad Hoc Network,” Proc. 10th Euromicro PDP , Gran Canaria, 2002.
S. Das et Al. “Ad Hoc On-Demand Distance Vector (AODV) Routing”, draft-ietf-manet-aodv- 17, February, 2003.
S. Marti et al., “Mitigating Routing Behavior in Mobile Ad Hoc Networks”, Proc. Mobicom, 2000.
T. Clausen et Al., “MANET Neighborhood Discovery Protocol (NHDP)”, draft-ietf-manetnhdp- 06, March 10, 2008.
T. Clausen et Al., “Representing multi-value time in MANETs”, draft-ietf-manet-timetlv-04, November 16, 2007.
T. Clausen et. Al.,“The Optimized Link State Routing Protocol version 2”, draft-ietf-manetolsrv2- 06, June 6, 2008.
T. Clausen et. Al.,” Generalized MANET Packet/Message Format”, draft-ietf-manet-packetbb- 13, June 24, 2008.
Y. Desmedt and Y. Frankel, “Threshold Cryptosystems”, Advances in Cryptography- Crypto’ 89, G. Brassard, Ed. Springer- Verlag, 1990.
Y. Desmedt “Threshold Cryptography”, Euro. Trans. Telecom., 5(4), 1994.
Y. Zhang and W.Lee, “Intrusion Detection in Wireless Ad Hoc Networks”, Proc. Mobicom. 2000.
Y. –C. Hu, D. B. Johnson and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks”, Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02), Jun. 2002
Dr. Rajender Nath
Dept of Computer Science and Applications - India
Mr. Pankaj Kumar Sehgal
MM Institute of Computer Technology and Business Management - India
pankajkumar.sehgal@gmail.com